In order to control the statutory monitoring of telecommunication traffic, provision is made in a network component essential for this monitoring of a data base in which it is stored for subscribers to be monitored which communication-relevant data are to be transmitted to one or more relevant monitoring authorities. monitoring profiles are also defined for the purpose of simplification.
|
1. A method for controlling a statutory monitoring of telecommunication traffic, which comprises:
defining relevant monitoring authorities for monitoring subscribers such that the relevant monitoring authorities are entities other than the subscribers to be monitored; providing, in a network component, a data base storing information determining which communication-relevant data are to be transmitted to the relevant monitoring authorities for the subscribers to be monitored; defining monitoring profiles stipulating in each case which of the communication-relevant data are to be transmitted to which relevant monitoring authority of the relevant monitoring authorities; and storing, for a subscriber to be monitored, data selected from the group consisting of one of the monitoring profiles that is valid for different ones of the relevant monitoring authorities and a plurality of the monitoring profiles, each one of the plurality of the monitoring profiles applicable to at least one of the monitoring authorities.
2. The method according to
|
This application is a continuation of International Application PCT/DE98/00022, filed Jan. 7, 1998, which designated the United States.
National (for example G10 Law, telecommunications monitoring regulations, and telecommunications law) and international laws require operators of a public (in future probably also of a private) network to make technical preparation to permit relevant authorities (i.e. law enforcement and secret service) to monitor the telecommunication traffic of suspicious persons in accordance with statutory regulations. The monitoring must be performed in conventional fixed networks just as in, for example, mobile networks and intelligent networks. In the case of the classical telephone services in the fixed network, the appropriate subscriber data record is marked for this purpose in the local exchange of the subscriber to be monitored, and a type of conference service is set up to the relevant authority.
One or more items of the following data are to be transmitted to the relevant authorities depending on the national legislation (the following list lays no claim to completeness):
a content of the communication;
a call number of the calling party;
an intelligent network number of the calling party;
a location of the calling party (for example in the case of mobile radio);
a calling number of the called party;
an intelligent network number of the called party;
a location of the called party (for example in the case of mobile radio);
the time of the start of the communication;
the time of the end of the communication;
a duration of the communication; and
the services used.
For reasons of data protection, but also because of performance, no more data should be transmitted to the relevant authority than necessary. The selection of the data which is necessary and/or can be authorized can vary, depending on the reasons for the monitoring, on the gravity of suspicion against the monitored party, or on the type of relevant authority. For example, a two-stage procedure is prescribed in the USA, firstly only the call data is communicated, and the transmitted content of the communication are not communicated until after a further decision by the official party. Furthermore, there are different national provisions according to which, for example, the relevant authority is informed only in the event of a successful call set-up or else, for example, if the line is engaged or when the handset is not picked up. It is also possible that only specific type of services, for example only data services, are to be monitored.
The solutions to date are static, that is to say it is not possible to make a case-specific selection from the data transmitted to the relevant authority. The invention aims at a different solution, which permits a case-specific selection from the data to be transmitted to the relevant authority.
It is accordingly an object of the invention to provide a method for controlling the statutory monitoring of telecommunication traffic that overcomes the above-mentioned disadvantages of the prior art methods of this general type. With the foregoing and other objects in view there is provided, in accordance with the invention, a method for controlling a statutory monitoring of telecommunication traffic, which includes providing in a network component a data base storing information determining which communication-relevant data are to be transmitted to relevant monitoring authorities for subscribers to be monitored.
In accordance with a concomitant feature of the invention there are the steps of defining monitoring profiles stipulating in each case which of the communication-relevant data are to be transmitted to which relevant monitoring authority of the relevant monitoring authorities; and storing for a subscriber to be monitored one monitoring profile valid for different relevant monitoring authorities.
In the alternative one can store for the subscriber to be monitored a plurality of the monitoring profiles valid for the different relevant monitoring authorities.
Other features which are considered as characteristic for the invention are set forth in the appended claims.
Although the invention is described herein as embodied in a method for controlling the statutory monitoring of telecommunication traffic, it is nevertheless not intended to be limited to the details discussed, since various modifications and structural changes may be made therein without departing from the spirit of the invention and within the scope and range of equivalents of the claims.
The construction and method of operation of the invention, however, together with additional objects and advantages thereof will be best understood from the following description of specific embodiments.
In a method for controlling a statutory monitoring of telecommunication traffic, necessary control features are stored in a database of an essential network component (for example an exchange, a service control point (SCP), and/or a home location register (HLR)), for each subscriber to be monitored and for each relevant authority monitoring him, which data in which cases are to be communicated to the relevant authority. This can be done in the form of a table, as represented by table 1 illustrated in FIG. 1.
The following legend is applicable to the table shown in
c=1: the call number of the communication partner is to be communicated; and
d=1: the number of the communication partner is to be communicated.
As an alternative, it is also possible to define a few monitoring profiles that contain typical combinations of different types of monitoring. Possible profiles are represented in Table 2. In this case, only the monitoring profile needs to be specified in each case in the network component.
TABLE 2 | ||||
Monitoring Profiles | ||||
Profile 1: | ||||
a | b | c | d | . . . |
0 | 0 | 1 | 0 | . . . |
Profile 2: | ||||
a | b | c | d | . . . |
1 | 0 | 1 | 0 | . . . |
Profile 3: | ||||
a | b | c | d | . . . |
1 | 1 | 1 | 1 | . . . |
Legend
a=1: the communication content is to be communicated,
b=1: the type of service used is to be communicated,
c=1: the call number of the communication partner is to be communicated, and
d=1: the intelligent network number of the communication partner is to be communicated.
Before being relayed to the relevant authority, the data determined during a monitoring measure in the network component are filtered in accordance with the stored scope of monitoring or the monitoring profile, and only the data required are communicated to the relevant authorities.
In the case of mobile networks and intelligent networks, the scope of monitoring or the monitoring profile must be relayed if necessary from the relevant database (that is to say, for example, from the HLR or SCP) to the exchange, stored there temporarily and evaluated before transmission of data to the relevant authorities. The person skilled in the art may gather the fundamentals for realizing the present invention in these cases from Published, Non-Prosecuted German Patent Applications DE 196 38 970.4 and DE 196 17 353.1.
Gundlach, Michael, Morgenroth, Andreas
Patent | Priority | Assignee | Title |
10641861, | Jun 02 2000 | MOBILE MAVEN LLC | Services and applications for a communications network |
10684350, | Jun 02 2000 | MOBILE MAVEN LLC | Services and applications for a communications network |
10849089, | Aug 23 2010 | FineTrak, LLC | Resource allocation according to geolocation of mobile communication units |
11610241, | Nov 07 2006 | Real estate transaction system | |
6728338, | Nov 08 2000 | WSOU Investments, LLC | Utilization of communication channels between a central office switch and a law enforcement agency |
6987849, | Apr 09 2002 | TEKELEC GLOBAL, INC | Method and systems for intelligent signaling router-based surveillance |
7123710, | Apr 09 2002 | TEKELEC GLOBAL, INC | Method and systems for intelligent signaling router-based surveillance |
8514841, | Nov 30 2007 | BROADSOFT, INC | IP-based call content intercept using repeaters |
8994591, | Sep 09 1996 | FineTrak, LLC | Locating a mobile station and applications therefor |
9060341, | Sep 09 1996 | TracBeam, LLC | System and method for hybriding wireless location techniques |
9106603, | Dec 23 2009 | Synchronica plc | Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content |
9134398, | Sep 09 1996 | TracBeam LLC | Wireless location using network centric location estimators |
9237543, | Sep 09 1996 | TracBeam, LLC | Wireless location using signal fingerprinting and other location estimators |
9277525, | Sep 09 1996 | TracBeam, LLC | Wireless location using location estimators |
9538493, | Aug 23 2010 | FineTrak, LLC | Locating a mobile station and applications therefor |
9875492, | May 22 2001 | MOBILE MAVEN LLC | Real estate transaction system |
Patent | Priority | Assignee | Title |
5799061, | Apr 26 1994 | Greater Harris County 9-1-1 Emergency Network | Computer integrated telephony system for the processing of 9-1-1 calls for service |
5825769, | Mar 17 1995 | Verizon Patent and Licensing Inc | System and method therefor of viewing in real time call traffic of a telecommunications network |
DE196173531, | |||
DE196389704, | |||
FR2712131, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Aug 13 1999 | Siemens Aktiengesellschaft | (assignment on the face of the patent) | / | |||
Sep 13 1999 | MORGENROTH, ANDREAS | Siemens Aktiengesellshaft | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 012497 | /0854 | |
Sep 15 1999 | GUNDLACH, MICHAEL | Siemens Aktiengesellshaft | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 012497 | /0854 | |
Feb 02 2009 | Siemens Aktiengesellschaft | Cinterion Wireless Modules GmbH | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 022552 | /0781 |
Date | Maintenance Fee Events |
Dec 07 2005 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jan 11 2010 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Dec 23 2013 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jul 09 2005 | 4 years fee payment window open |
Jan 09 2006 | 6 months grace period start (w surcharge) |
Jul 09 2006 | patent expiry (for year 4) |
Jul 09 2008 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jul 09 2009 | 8 years fee payment window open |
Jan 09 2010 | 6 months grace period start (w surcharge) |
Jul 09 2010 | patent expiry (for year 8) |
Jul 09 2012 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jul 09 2013 | 12 years fee payment window open |
Jan 09 2014 | 6 months grace period start (w surcharge) |
Jul 09 2014 | patent expiry (for year 12) |
Jul 09 2016 | 2 years to revive unintentionally abandoned end. (for year 12) |